1、3650 英文单词,英文单词,2 万英文字符万英文字符,中文,中文 6350 字字 文献出处:文献出处:Kang A N, Barolli L, Park J H, et al. A strengthening plan for enterprise information security based on cloud computingJ. Cluster computing, 2014, 17(3): 703-710. A strengthening plan for enterprise information security based on cloud computing An
2、Na Kang Leonard Barolli Jong Hyuk Park Young-Sik Jeong Abstract Cloud computing environment came about in order to effectively manage and use enormous amount of data that have become available with the development of the Internet. Cloud computing service is widely used not only to manage the users I
3、T resources, but also to use enterprise IT resources in an effective manner. V arious security threats have occurred while using cloud computing and plans for reaction are much needed, since they will eventually elevate to security threats to enterprise information. Plans to strengthen the security
4、of enterprise information by using cloud security will be proposed in this research. These cloud computing security measures must be supported by the governmental policies. Publications on guidelines to information protection will raise awareness among the users and service providers. System of reac
5、tion must be created in order to constantly monitor and to promptly respond to any security accident. Therefore, both technical countermeasures and governmental policy must be supported at the same time. Cloud computing service is expanding more than ever, thus active research on cloud computing sec
6、urity is expected. Keywords : Cloud computing Cloud security Security threats Enterprise information security 1. Introduction Cloud computing can be defined as Internet-based computing whereby scalable and elastic IT resources are provided to many clients at the same time, as shown Table 1 13. Important characteristics of cloud computing is that, unlike the existing computing service where the user has to own and manage his own IT resources, it provides necessary amount of virt